101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

575
active users

#securityupdates

0 posts0 participants0 posts today
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GrapheneOS</span></a></span> Well, you've to ask <a href="https://infosec.space/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> and <a href="https://infosec.space/tags/Fiarphone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fiarphone</span></a> that and consider invoking <a href="https://infosec.space/tags/Regulators" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Regulators</span></a> like <span class="h-card" translate="no"><a href="https://ec.social-network.europa.eu/@EUCommission" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>EUCommission</span></a></span>, @kartellamt@social.bund.de and others in that matter.</p><p>Which again proves my point:</p><ol><li><p><a href="https://infosec.space/tags/AllGAFAMsAreEvil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AllGAFAMsAreEvil</span></a> and <em>NOONE</em> shoud've ever trusted them with anything!</p></li><li><p>The <a href="https://infosec.space/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> ecosystem is fucked up and there is a need for <a href="https://infosec.space/tags/vendors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vendors</span></a> to refuse to bow before <a href="https://infosec.space/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> and actually do <a href="https://infosec.space/tags/secure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secure</span></a> &amp; <a href="https://infosec.space/tags/repairable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>repairable</span></a> devices.</p></li></ol> <p>Again: You seem angry at the wromg person if that means you're angry at me.</p><p>The question to me is how is <a href="https://infosec.space/tags/GrapheneOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GrapheneOS</span></a> gonna go about this? </p><ul><li>Cuz we both know Google can afford to go <em>"maximum asshole"</em> on you [the Grpahnene OS Project] and even in the worst case their legal department won't even notice this whole shitshow even if miraculously by the wounders of everyone from <span class="h-card" translate="no"><a href="https://mastodon.social/@eff" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>eff</span></a></span> to <span class="h-card" translate="no"><a href="https://hostux.social/@fsf" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fsf</span></a></span> to <span class="h-card" translate="no"><a href="https://mastodon.social/@noybeu" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>noybeu</span></a></span> and <span class="h-card" translate="no"><a href="https://social.bau-ha.us/@CCC" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>CCC</span></a></span> forcing Google to literally support and endore GrapheneOS, because by the time any binding court ruling would be enforced, Google would've choked the project out of the market.</li></ul> <p>So my question is <em>when</em> will you get forward and work with other <a href="https://infosec.space/tags/vendors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vendors</span></a> instead of tying your project to Google-specific and thus sorta-proprietary implementations?</p><p><code>[...] Pixel targets have a lot of device-specific hardening in the AOSP base along with some in GrapheneOS which needs to be ported over too. For example, various security features in the kernel including type-based Control Flow Integrity (CFI) and the shadow call stack are currently specific to the kernels for these devices. [...]</code></p><ul><li><a href="https://grapheneos.org/build#building-grapheneos" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">grapheneos.org/build#building-</span><span class="invisible">grapheneos</span></a></li></ul><p>To me that sounds like some very serious <a href="https://infosec.space/tags/VendorLockIn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VendorLockIn</span></a> you're stuck in, and now it bites you in your rear...</p><p>I hate to say it, but <a href="https://infosec.space/tags/ToldYaSo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ToldYaSo</span></a> sadly happened!</p><p>I guess you gotta have to <a href="http://landley.net/toybox/" rel="nofollow noopener" target="_blank">bootstrap it from scratch</a> starting with <a href="https://infosec.space/tags/toybox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>toybox</span></a> + musl / <a href="https://infosec.space/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> sooner or later...</p> <p>Not to seem like an asshole, but I do sincerely wish GrpaheneOS and it's team only the best of luck and that the issue gets fixed sooner than later, because this <a href="https://infosec.space/tags/Vendor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vendor</span></a> <a href="https://infosec.space/tags/LockIn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockIn</span></a> is a major issue [and yes I do blame the Device Vendors that shit out unmaintained garbage] so unless you can afford the legal cost of actuall enforcing <a href="https://infosec.space/tags/EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EU</span></a> laws re: <a href="https://infosec.space/tags/SecurityUpdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityUpdates</span></a> and force Vendors like <a href="https://infosec.space/tags/Fairphone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fairphone</span></a> to actually follow their claims re: <a href="https://infosec.space/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> and <a href="https://infosec.space/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a>, this won't move anywhere.</p><ul><li>Yes I know you don't have that money and I don't expect this to be the case! </li></ul><p>I do however also don't expect you to find a magical solution. My point is that there needs to be a change of strategy, and relying on Hardware you neither <em>own</em> nor <em>control</em> in the sense of Stakeholding isn't going to provide you with the necessary stability.</p><ul><li>Because Google is a [pulicly traded] <a href="https://infosec.space/tags/Corporation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Corporation</span></a> and Corporations are explicity nobody's friend!</li></ul>
IT News<p>Apple will update iPhones for at least 5 years in rare public commitment - Enlarge (credit: Apple) </p><p>Apple has taken a rare step and public... - <a href="https://arstechnica.com/?p=2029397" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2029397</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/securityupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityupdates</span></a> <a href="https://schleuss.online/tags/iphone15pro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iphone15pro</span></a> <a href="https://schleuss.online/tags/apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apple</span></a> <a href="https://schleuss.online/tags/ios17" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios17</span></a> <a href="https://schleuss.online/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://schleuss.online/tags/ios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios</span></a></p>
Element<p>Hey folks! </p><p>Heads up: we’ve rolled out security updates for Element X Android (0.4.12) &amp; iOS (1.6.7) to address a High severity vulnerability. </p><p>Users’ privacy matters to us so we believe it’s important to be transparent when these things occur. </p><p>Check out our latest blog post to find out more details, and update your apps to stay secure.</p><p><a href="https://element.io/blog/security-release-element-x-android-0-4-12-and-ios-1-6-7/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">element.io/blog/security-relea</span><span class="invisible">se-element-x-android-0-4-12-and-ios-1-6-7/</span></a></p><p><a href="https://mastodon.matrix.org/tags/elementx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>elementx</span></a> <a href="https://mastodon.matrix.org/tags/securityupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityupdates</span></a> <a href="https://mastodon.matrix.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p>
IT News<p>Windows security updates could come with fewer reboots beginning later this year - Enlarge / A PC running Windows 11. (credit: Microsoft) </p><p>Microso... - <a href="https://arstechnica.com/?p=2005857" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2005857</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/securityupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityupdates</span></a> <a href="https://schleuss.online/tags/windows1124h2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows1124h2</span></a> <a href="https://schleuss.online/tags/windowsserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsserver</span></a> <a href="https://schleuss.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://schleuss.online/tags/windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows11</span></a> <a href="https://schleuss.online/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a></p>
IT News<p>Apple warns proposed UK law will affect software updates around the world - Enlarge </p><p>Apple is "deeply concerned" that proposed changes to ... - <a href="https://arstechnica.com/?p=1999789" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1999789</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/governmentsurveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>governmentsurveillance</span></a> <a href="https://schleuss.online/tags/investigatorypowersact" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>investigatorypowersact</span></a> <a href="https://schleuss.online/tags/applesecurityupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>applesecurityupdates</span></a> <a href="https://schleuss.online/tags/endtoendencryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endtoendencryption</span></a> <a href="https://schleuss.online/tags/securityupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityupdates</span></a> <a href="https://schleuss.online/tags/onlinesecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>onlinesecurity</span></a> <a href="https://schleuss.online/tags/onlineprivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>onlineprivacy</span></a> <a href="https://schleuss.online/tags/unitedkingdom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unitedkingdom</span></a> <a href="https://schleuss.online/tags/policy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>policy</span></a> <a href="https://schleuss.online/tags/apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apple</span></a></p>
Brad Linder<p>Microsoft will offer a chance to pay for extended security updates for Windows 10 for up to 3 years after it reaches end of support on Oct 14, 2025, but the company is really pushing upgrades to Win 11 (or new PC purchases) instead. <a href="https://buff.ly/3uNp2ur" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">buff.ly/3uNp2ur</span><span class="invisible"></span></a> <a href="https://fosstodon.org/tags/Windows10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows10</span></a> <a href="https://fosstodon.org/tags/SecurityUpdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityUpdates</span></a> <a href="https://fosstodon.org/tags/Micrososft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Micrososft</span></a></p>
Linux TLDR<p>Linux Weekly Roundup: Red Hat Enterprise Linux 9.3, AlmaLinux OS 9.3, Emergency Tails 5.19.1, and More!<br><a href="https://noc.social/tags/LinuxUpdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxUpdates</span></a> <a href="https://noc.social/tags/AlmaLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlmaLinux</span></a> <a href="https://noc.social/tags/RedHatEnterpriseLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedHatEnterpriseLinux</span></a> <a href="https://noc.social/tags/Oracle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oracle</span></a> <a href="https://noc.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://noc.social/tags/pfSense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pfSense</span></a> <a href="https://noc.social/tags/Netgate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netgate</span></a> <a href="https://noc.social/tags/SecurityUpdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityUpdates</span></a> <a href="https://noc.social/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a> <a href="https://noc.social/tags/LinuxNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxNews</span></a><br><a href="https://linuxtldr.com/weekly-roundup/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">linuxtldr.com/weekly-roundup/</span><span class="invisible"></span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>Critical security updates are here for Android devices! 🔒 </p><p>Devices with security patch levels of 2023-11-05 or later are fully protected against all documented vulnerabilities.🚀 The biggest fix is for <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40113" rel="nofollow noopener" target="_blank">CVE-2023-40113</a>, a critical info disclosure vulnerability in the System component. </p><p>Update your devices to the latest Android version for maximum protection! 📲 Google Play Protect is your shield, especially when downloading apps from sources outside the Google Play Store. 🚫 </p><p><a href="https://source.android.com/docs/security/bulletin/2023-11-01" rel="nofollow noopener" target="_blank">Android Security Bulletin—November 2023</a></p><p><a href="https://infosec.exchange/tags/SecurityUpdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityUpdates</span></a> <a href="https://infosec.exchange/tags/AndroidProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AndroidProtection</span></a> <a href="https://infosec.exchange/tags/GooglePlayProtect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GooglePlayProtect</span></a> 📅 <a href="https://infosec.exchange/tags/November2023" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>November2023</span></a> <a href="https://infosec.exchange/tags/AndroidSecurityBulletin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AndroidSecurityBulletin</span></a> 🛡️</p>
Linux TLDR<p>Linux Weekly Roundup: Garuda Linux 85, Tails 5.19, and FreeBSD 14.0-RELEASE<br><a href="https://noc.social/tags/GarudaLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GarudaLinux</span></a> <a href="https://noc.social/tags/Tails519" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tails519</span></a> <a href="https://noc.social/tags/FreeBSD140RELEASE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD140RELEASE</span></a> <a href="https://noc.social/tags/HyprlandEdition" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HyprlandEdition</span></a> <a href="https://noc.social/tags/Plasma6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Plasma6</span></a> <a href="https://noc.social/tags/SecurityUpdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityUpdates</span></a> <a href="https://noc.social/tags/UGrep" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UGrep</span></a> <a href="https://noc.social/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TorBrowser</span></a> <a href="https://noc.social/tags/ZFSRootEFI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZFSRootEFI</span></a> <a href="https://noc.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a><br><a href="https://linuxtldr.com/weekly-roundup/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">linuxtldr.com/weekly-roundup/</span><span class="invisible"></span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 <a href="https://infosec.exchange/tags/CitrixHypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixHypervisor</span></a> Security Alert! 🚨"</p><p>Citrix has identified several security issues in Citrix Hypervisor 8.2 CU1 LTSR that could potentially compromise system security. These issues include AMD-based host compromise through a PCI device (CVE-2023-34326), host compromise with specific administrative actions (CVE-2022-1304), host crashes or unresponsiveness (CVE-2023-34324), and crashing of other VMs on AMD-based hosts (CVE-2023-34327). Additionally, a security problem affecting certain AMD CPUs, which may allow code in a guest VM to access previous integer divides in code running on the same CPU core, has been disclosed as CVE-2023-20588.</p><p>Mitigating factors include the dependency on AMD CPUs and the use of specific features. Customers not using AMD CPUs or PCI passthrough features may not be affected by some of these issues.</p><p>Citrix has released multiple security updates for Citrix Hypervisor 8.2 CU1 LTSR. Several vulnerabilities have been discovered:</p><ol><li><strong>CVE-2023-34326</strong>: A threat that allows malicious privileged code in a guest VM to compromise an AMD-based host via a passed-through PCI device.</li><li><strong>CVE-2022-1304</strong>: A vulnerability that can compromise the host when a specific administrative action is taken.</li><li><strong>CVE-2023-34324</strong>: A flaw that can cause the host to crash or become unresponsive.</li><li><strong>CVE-2023-34327</strong>: A vulnerability that can cause a different VM running on the AMD-based host to crash.</li><li><strong>CVE-2023-20588</strong>: A security issue affecting certain AMD CPUs, allowing code in a guest VM to determine values from previous integer divides in code running on the same CPU core.</li></ol><p>Citrix has provided hotfixes for these vulnerabilities. Affected users are advised to install these updates and follow the provided instructions. For more details, check the official Citrix article <a href="https://support.citrix.com/article/CTX575089" rel="nofollow noopener" target="_blank">here</a>.</p><p>Tags: <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://infosec.exchange/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hypervisor</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/AMD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AMD</span></a> <a href="https://infosec.exchange/tags/CVE2023" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE2023</span></a> <a href="https://infosec.exchange/tags/CVE2022" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE2022</span></a> <a href="https://infosec.exchange/tags/SecurityUpdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityUpdates</span></a> 🛡️🔧</p>
IT News<p>iOS 16.7 arrives for older iPhones and people who don’t want to upgrade - Enlarge / iPhones running iOS 16. (credit: Apple) </p><p>Apple has re... - <a href="https://arstechnica.com/?p=1970394" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1970394</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/securityupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityupdates</span></a> <a href="https://schleuss.online/tags/ipados15" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipados15</span></a> <a href="https://schleuss.online/tags/ipados16" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipados16</span></a> <a href="https://schleuss.online/tags/ipados17" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipados17</span></a> <a href="https://schleuss.online/tags/ipados" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipados</span></a> <a href="https://schleuss.online/tags/apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apple</span></a> <a href="https://schleuss.online/tags/ios15" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios15</span></a> <a href="https://schleuss.online/tags/ios16" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios16</span></a> <a href="https://schleuss.online/tags/ios17" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios17</span></a> <a href="https://schleuss.online/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a></p>
Matt Kilgore<p>It was my turn to push the forum post on SysAdmins Zone today for patch tuesday... Going to end up looking into scripting the whole thing. Talk about a lot of work and effort for a nice little post :)<br><a href="https://sysadmins.zone/topic/49/july-2023-patch-tuesday/1" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sysadmins.zone/topic/49/july-2</span><span class="invisible">023-patch-tuesday/1</span></a></p><p><a href="https://infosec.exchange/tags/patchtuesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patchtuesday</span></a> <a href="https://infosec.exchange/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://infosec.exchange/tags/securityupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityupdates</span></a></p>
Kevin Karhan :verified:<p><span class="h-card"><a href="https://social.fbievan.live/users/fbievan" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fbievan</span></a></span> <span class="h-card"><a href="https://fedi.cpluspatch.com/users/cpluspatch" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cpluspatch</span></a></span> <span class="h-card"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GrapheneOS</span></a></span> +1</p><p>So what are the options for a device that is <a href="https://mstdn.social/tags/repairable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>repairable</span></a> gets <a href="https://mstdn.social/tags/LongTermSupport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LongTermSupport</span></a> and tiely <a href="https://mstdn.social/tags/SecurityUpdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityUpdates</span></a>?</p><p>Apparently neither <span class="h-card"><a href="https://social.weho.st/@Fairphone" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Fairphone</span></a></span> nor <span class="h-card"><a href="https://social.nitrokey.com/@nitrokey" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>nitrokey</span></a></span> !?</p>
The Tor Project<p>The latest version 12.0.5 is now available for download. This update includes Firefox bug fixes, stability improvements, and security updates. Stay tuned for 12.0.6 next month!" <a href="https://mastodon.social/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TorBrowser</span></a> <a href="https://mastodon.social/tags/Update" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Update</span></a> <a href="https://mastodon.social/tags/SecurityUpdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityUpdates</span></a><br>🔗 <a href="https://blog.torproject.org/new-release-tor-browser-1205/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.torproject.org/new-releas</span><span class="invisible">e-tor-browser-1205/</span></a></p>
Volla<p>next update is rolling out from our own OTA Servers to the <a href="https://mastodon.social/tags/VollaPhone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VollaPhone</span></a> - Check your system settings. <br>Updating <a href="https://mastodon.social/tags/securityUpdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityUpdates</span></a> and some smaller performance things. <br>And if you don't have a Volla Phone yet, its the best time to get one at a discount on <a href="http://volla.online" rel="nofollow noopener" target="_blank"><span class="invisible">http://</span><span class="">volla.online</span><span class="invisible"></span></a></p>
ITSEC News<p>Microsoft Patch Tuesday — March 2020: Vulnerability disclosures and Snort coverage - By Jon Munshaw and Vitor Ventura.Microsoft released its monthly security update today, disclosing vu... more: <a href="http://feedproxy.google.com/~r/feedburner/Talos/~3/QDmutXTZ35E/microsoft-patch-tuesday-march-2020.html" rel="nofollow noopener" target="_blank"><span class="invisible">http://</span><span class="ellipsis">feedproxy.google.com/~r/feedbu</span><span class="invisible">rner/Talos/~3/QDmutXTZ35E/microsoft-patch-tuesday-march-2020.html</span></a> <a href="https://schleuss.online/tags/microsoftmediafoundation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoftmediafoundation</span></a> <a href="https://schleuss.online/tags/microsoftpatchtuesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoftpatchtuesday</span></a> <a href="https://schleuss.online/tags/microsoftupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoftupdates</span></a> <a href="https://schleuss.online/tags/securityupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityupdates</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/patches" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patches</span></a> <a href="https://schleuss.online/tags/gdi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gdi</span></a></p>